© 2005 Ravi Sandhu Permissions and Inheritance (best viewed in slide show mode) Ravi Sandhu...

Preview:

Citation preview

© 2005 Ravi Sandhuwww.list.gmu.edu

Permissions and Inheritance(best viewed in slide show mode)

Ravi SandhuLaboratory for Information Security Technology

George Mason Universitywww.list.gmu.edusandhu@gmu.edu

2

© 2005 Ravi Sandhuwww.list.gmu.edu

Reference

• Jason Crampton. “On permissions, inheritance and role hierarchies.” Proceedings of the 10th ACM conference on Computer and communications security, Washington D.C 2003, pages: 85-92

• Several diagrams and text excerpts are taken directly from this paper.

3

© 2005 Ravi Sandhuwww.list.gmu.edu

Arrow notation

4

© 2005 Ravi Sandhuwww.list.gmu.edu

Administrative scope

5

© 2005 Ravi Sandhuwww.list.gmu.edu

Effective roles of permission p

up

down

neutral

6

© 2005 Ravi Sandhuwww.list.gmu.edu

Permission Hierarchy

7

© 2005 Ravi Sandhuwww.list.gmu.edu

Consistency and redundancy

8

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

9

© 2005 Ravi Sandhuwww.list.gmu.edu

Simulating BLP (liberal *-property)

Maximal or minimal permission is assigned to exactly one role

10

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

11

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

12

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

13

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

14

© 2005 Ravi Sandhuwww.list.gmu.edu

Constraints for simulating BLP

15

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels

16

© 2005 Ravi Sandhuwww.list.gmu.edu

Security levels

Recommended